首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
The devastating explosion in Oklahoma City on 19 April 1995 has drawn attention to the existence of citizen militias and the Patriot movement of which they are part. Opposed to gun control and taxation and strongly influenced by claims of concealed foreign troops, concentration camps and plans to impose a New World order, Patriots are the inheritors of a radical rightist conspiratorialism dating back to the 1960s. Believing American liberties to be as threatened by Oliver North as by President Clinton, the movement is a diffuse subculture which encompasses both racist adherents of what is termed Christian Identity and more traditional Christian fundamentalists (and even includes some members of ethnic minorities). The Oklahoma bombing, it believes, was the work of forces seeking to demonize the movement but while it argues that the creation of militias is purely defensive, there is a constant danger of confrontation with the state in the rhetoric of a second American Revolution.  相似文献   

2.
    
Although much has been written about how and why individuals become terrorists, very little research has focused on why individuals choose not to become involved in political violence. Some assume that these non-radicalized individuals simply have not had the same life experiences as terrorists. Yet one only has to explore areas of conflict, such as the Gaza Strip, northwest Pakistan, or the southern Philippines, to wonder why more individuals have not joined local militant groups. This article presents a conceptual model ofnon-radicalization in an attempt to move the discussion forward on this topic. It argues that it is impossible to understand radicalization pathways, or design policies to preempt them, without a complementary knowledge ofwhy individuals resist the influence ofviolent extremism.  相似文献   

3.
    
ABSTRACT

This study explores differences in perpetrators of suicide attacks and non-suicide attacks in the United States. The study uses data on far-right and Al Qaeda and affiliated/inspired terrorists between 1990 and 2013 from the United States Extremist Crime Database. Our analysis estimates logistic regression models to test whether suicide attackers were more likely to have exhibited specific risk factors for suicidality, while examining other prominent claims regarding patterns of suicide terrorism. Suicide attackers were no more likely than non-suicide attackers to have previously attempted suicide or to have been diagnosed as mentally ill. Suicide attackers were more likely, though, to have a history of substance abuse, to be loners, have served in the military, participated in paramilitary training, and be more ideologically committed to the cause. We found that Al Qaeda affiliated/inspired attackers were more likely than far-right attackers to have engaged in a suicide mission. With the current focus on Americans traveling to Syria and Iraq to receive training and fight for jihadist movements (e.g., the Islamic State), our findings appear relevant. Observers have expressed concern that these fighters may return and then commit attacks in their homeland. Law enforcement could make use of this study’s findings.  相似文献   

4.
    
The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005.  相似文献   

5.
    
Drawing from the work of political theorists, theologians, anthropologists, journalists, philosophers, and contemporary psychologists studying Terror Management Theory (TMT), it becomes possible to see that the concepts of existentialism and ideology may be useful for modern thinkers attempting to understand a problem such as terrorism. Integrating work from these fields makes it possible to see that terrorism may be driven by an existential-terroristic feedback loop: a cycle in which people support or engage in terrorism to alleviate existential anxiety but ultimately find this anxiety exacerbated in the wake of the violence they create or sanction. The loop is closed when this exacerbated anxiety compels them to reaffirm their support of, or participation in, terrorist violence. If this model is valid, then effectively addressing the problem of terrorism requires joining existing U.S. policies with policies that address ideologies. Specifically, policies must aspire to a) mitigate existential anxiety, b) provide a compelling counter-narrative, c) address environmental factors conducive to radicalization, d) prevent the formation of radicalized groups, and e) deradicalize existing ideologues.  相似文献   

6.
    
Network analysis has attracted significant attention when researching the phenomenon of transnational terrorism, particularly Al Qaeda. While many scholars have made valuable contributions to mapping Al Qaeda, several problems remain due to a lack of data and the omission of data provided by international organizations such as the UN. Thus, this article applies a social network analysis and subsequent mappings of the data gleaned from the Security Council's consolidated sanctions list, and asks what they can demonstrate about the structure and organizational characteristics of Al Qaeda. The study maps the Al Qaeda network on a large scale using a newly compiled data set. The analysis reveals that the Al Qaeda network consists of several hundred individual and group nodes connecting almost all over the globe. Several major nodes are crucial for the network structure, while simultaneously many other nodes only weakly and foremost regionally connect to the network. The article concludes that the findings tie in well to the latest research pointing to local and simultaneously global elements of Al Qaeda, and that the new data is a valuable source for further analyses, potentially in combination with other data.  相似文献   

7.
This article uses immigration and other biographical data to refute much of the conventional wisdom about the relationship between terrorism and immigration. Using a database created from the biographical data of 373 terrorists, we have established a number of significant findings. Over forty percent of our database is made up of Western Nationals. Second, despite widespread alarms raised over terrorist infiltration from Mexico, we found no terrorist presence in Mexico and no terrorists who entered the U.S. from Mexico. Third, we found a sizeable terrorist presence in Canada and a number of Canadian-based terrorists who have entered the U.S. In addition to illuminating the terrorist networks entrenched in the West, this paper is also an attempt to advance the field of terrorism studies by taking a quantitative approach to data analysis.  相似文献   

8.
Despite the Dutch Hofstadgroup's status in the literature as a prime example of a homegrown Salafi-Jihadist terrorist network, the authors, using newly available primary sources, argue that this classification is to a large extent unwarranted. The lack of a rudimentary organizational structure, the existence of divergent views on the legitimacy and desirability of political violence, and the absence of collective action in pursuit of a violent goal rule out labeling the Hofstadgroup as a terrorist organization or network for the largest part of its 2002–2005 existence. A smaller subgroup of extremists did begin developing into a proto-terrorist inner circle from late 2003 onwards. In 2004, this extremist core brought forth the murderer of filmmaker Theo van Gogh. But it was only in 2005, when the remnants of the inner circle tried to resuscitate the Hofstadgroup in the wake of the arrests that had followed Van Gogh's death, that these individual actions were replaced by the communal efforts necessary to warrant the “jihadist network” label often ascribed to the Hofstadgroup. Arguably the most archetypical aspect of the Hofstadgroup case is its ability to illustrate the deleterious effects of the ongoing scarcity of primary sources-based research on terrorism.  相似文献   

9.
    
Research on the motives of those who engage in small group political violence typically takes a qualitative or quantitative form. I argue that researchers should seek to understand why people engage in small group political violence, and that the best way to achieve such understanding is to employ both. The advantages of this approach are discussed in this paper, as is the importance of recognizing that the activities of all actors in any given violent location, including state actors, should be accounted for in research.  相似文献   

10.
    
Over the last few years, Moroccans have been disproportionately involved in jihadist terrorism. Morocco has been increasingly identified as one of the largest producers of terrorists and insurgents in Afghanistan, Iraq, and throughout Europe. This article examines the factors behind the emergence of jihadist terrorism in Morocco, and how this terrorist threat has gone beyond this country's borders. Three factors have contributed to this development: the influence of global jihad on potential Moroccan jihadists; the growing Islamization of the country; and deteriorating socioeconomic conditions. In analyzing these variables, special attention will be paid to the Casablanca terrorist attacks on May 16, 2003, marking the debut of suicide terrorism in Morocco. The article will also examine the principal counterterrorist initiatives Morocco has implemented in response to this threat.  相似文献   

11.
    
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities.  相似文献   

12.
    
This analysis surveys Al Qaeda's employment of denial and deception (D&D) and shows that it uses D&D on tactical and operational levels in order to achieve strategic results. It defines denial and deception and explains how they relate to Al Qaeda, overviews Al Qaeda's changing network structure and seeks to summarize how Al Qaeda employs D&D throughout its operations. This paper is structured to show that denial and deception are institutionalized factors that manifest themselves through all aspects of bin Laden's organization and that the traditional conception of D&D—that nonstate actors are incapable of employing deception as an element of grand strategy—is incorrect.  相似文献   

13.
The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001.  相似文献   

14.
    
Al Qaeda's ideology is not new; their critique of the existing political and social order and vision for how to redeem the Muslim world builds on preexisting arguments of several 20th century predecessors who called for an Islamic revolution that would create a new order based on Islam. The persistence of revolutionary Islam suggests that these ideas need to be countered in order to strike at the root of the problem driving Islamically motivated terrorism and insurgency. U.S. efforts to defeat Al Qaeda, however, continue to focus primarily on killing or capturing the leadership, interdicting operations, and defensively bolstering the homeland and U.S. assets against various types of attacks. In order to confront Al Qaeda's ideology, U.S. efforts should focus on indirectly fostering “a market place of ideas”—the space and culture of questioning and debating—in order to challenge the grievances and solutions proposed by revolutionary Islam.  相似文献   

15.
This paper deals with NATO’s ability to contribute to the war on terrorism. The paper highlights the difficulties that the organization has encountered in dealing with a threat that is entirely different from the one that the organization was created to deal with. The paper discusses NATO’s new policies, al Qaeda’s transformation since 9/11, and the nature of terrorism. The paper suggests that although NATO has drafted a number of new antiterrorist policies they are all premised on the idea of fighting a war against terrorism as if terrorism were a well defined military enemy. We conclude by arguing that the organizational behavior demonstrated by NATO is consistent with what Graham Allison and Philip Zelikow predict in their organizational process model and that many of the difficulties encountered by NATO in the war against terrorism are due to the nature of the organization. An erratum to this article is available at .  相似文献   

16.
    
ABSTRACT

Why did the Islamic State of Iraq and al-Sham (ISIS) and Jabhat al-Nusra (JN)—two groups that shared similar ideological preferences and were both initially part of the Al Qaeda network—take different paths in the Syrian conflict? Part of the answer lies in the fact that JN is primarily a Syrian organization, whereas Iraqis lead ISIS. A jihadist group’s relationship to its country of origin and domicile (the two are not always the same) helps to explain that organization’s ideological preferences and alliance behavior. Yet no method of categorization based on jihadist-state relations exists. I fill this gap by theorizing an explanatory typology based on a jihadist group’s relationship with its country of origin and/or domicile. This typology consists of two tiers. The first classifies jihadist organizations based on whether they are nationally homogeneous or heterogeneous, and whether they are based in their country of origin, exile, or multiple locations. The second tier categorizes groups based on the nature of their engagement—collaborative, belligerent, or neutral—with a state. This new typology enables the generation of multiple hypotheses and has practical implications given that most U.S. counterterrorism efforts require cooperation from partner nations.  相似文献   

17.
18.
19.
20.
My aim in this article is to extend Marc Sageman's seminal research on Al Qaeda by re-articulating it through the prism of Albert Cohen's theory of delinquent subcultures, an approach which came to prominence in Criminology in the 1960s, but has since then been largely eclipsed by other approaches in that field. Drawing on Sageman's findings and observations, I suggest that Al Qaeda-affiliated or -inspired groups in the West can be best understood as a collective response or “solution” to the strains encountered by the members of these groups, and that these strains are imposed on them by the circumstances in which they find themselves. My broader aim is to show that although Criminology, with a few exceptions, ignores the subject of terrorism, terrorism studies can appreciably benefit from an engagement with Criminology as a source of theoretical inspiration.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号